The Hacker News – Most Popular Cyber Security, Hacking News Site: Decryption keys

DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions

DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions

October 24, 2017Mohit Kumar
DUHK — Don't Use Hard-coded Keys — is a new 'non-trivial' cryptographic implementation vulnerability that could allow attacke...
Serious Crypto-Flaw Lets Hackers Recover Private RSA Keys Used in Billions of Devices

Serious Crypto-Flaw Lets Hackers Recover Private RSA Keys Used in Billions of Devices

October 16, 2017Swati Khandelwal
If you think KRACK attack for WiFi is the worst vulnerability of this year, then hold on… ...we have got another one for you which is ...
WannaCry Coding Mistakes Can Help Files Recovery Even After Infection

WannaCry Coding Mistakes Can Help Files Recovery Even After Infection

June 02, 2017Swati Khandelwal
Last month  WannaCry ransomware  hit more than 300,000 PCs across the world within just 72 hours by using its self-spreading capabilities to...
WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom

WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom

May 18, 2017Swati Khandelwal
If your PC has been infected by WannaCry – the ransomware that wreaked havoc across the world last Friday – you might be lucky to get yo...
This Ransomware Unlocks Your Files For Free If You Infect Others

This Ransomware Unlocks Your Files For Free If You Infect Others

December 09, 2016Mohit Kumar
Is your PC infected with Ransomware? Either pay the ransom amount to the attacker or spread the infection further to get the decryption k...
DROWN Attack — More than 11 Million OpenSSL HTTPS Websites at Risk

DROWN Attack — More than 11 Million OpenSSL HTTPS Websites at Risk

March 01, 2016Swati Khandelwal
A new deadly security vulnerability has been discovered in OpenSSL that affects more than 11 Million modern websites and e-mail services...
How-to — Stealing Decryption Key from Air-Gapped Computer in Another Room

How-to — Stealing Decryption Key from Air-Gapped Computer in Another Room

February 15, 2016Swati Khandelwal
Air-gapped computers that are believed to be the most secure computers on the planet have become a regular target for researchers in re...
CryptoWall Ransomware raised $325 Million in Revenue for Its Developer

CryptoWall Ransomware raised $325 Million in Revenue for Its Developer

October 30, 2015Mohit Kumar
The Creators of the notorious CryptoWall ransomware virus have managed to raise more than $325 million (£212 million) in this past year...
TrueCrypt Encryption Software Has Two Critical Flaws: It's time to Move On

TrueCrypt Encryption Software Has Two Critical Flaws: It's time to Move On

September 30, 2015Khyati Jain
If you are among thousands of privacy-conscious people who are still using ‘ no longer available ’ TrueCrypt Encryption Software , then ...
Free CryptoLocker Ransomware Decryption Tool Released

Free CryptoLocker Ransomware Decryption Tool Released

August 06, 2014Swati Khandelwal
When I say Ransomware, the first nasty piece of malware strikes in the mind is CryptoLocker . A nasty strain of ransomware malware that ...
Student Decrypts Simplocker Android Ransomware that Encrypts Files

Student Decrypts Simplocker Android Ransomware that Encrypts Files

June 17, 2014Swati Khandelwal
In a previous story, I reported about a new ransomware threat known as Simplocker discovered by researchers at the security firm ESET, ...
Dumb Ransomware Developer leaves Decryption Keys on Infected Computers

Dumb Ransomware Developer leaves Decryption Keys on Infected Computers

April 02, 2014Swati Khandelwal
So, How do Hackers compromise a Website? Simply by exploiting the flaws in it, that means they took advantage of the error in the developers...
LOCKER Malware - Yet another new variant of Cryptolocker Ransomware

LOCKER Malware - Yet another new variant of Cryptolocker Ransomware

December 13, 2013Mohit Kumar
Ransomware , a t hreat to internet users that continues to grow in popularity with cyber criminals due to its success and monetary potential...